A Power Analysis System for Cryptographic Devices

Article Preview

Abstract:

In order to test the security of cryptographic devices against Side Channel Attacks (SCA), an automatic general-purpose power analysis system (TH-PAS-01) is designed and implemented. TH-PAS-01 is scalable and can be applied to many cryptographic devices when specific modules are installed. Using the system TH-PAS-01, correlation power analysis (CPA) are carried out on an AES chip under two working models: normal and shuffling mode. The security level of the countermeasure provided by the target chip is verified by TH-PAS-01. The experimental results show that the correct key of the AES chip is obtained with around 50,000 power traces when the chip was working under normal mode, while the whole key bits are not obtained with 960,000 power traces when the chip works under shuffling mode. The automatic general-purpose system TH-PAS-01 is feasible for security analysis on power analysis for cryptographic devices.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 718-720)

Pages:

2376-2382

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", Crypto 1999, Lecture Notes in Computer Science, volume 1666, pp.398-412, 1999.

Google Scholar

[2] Bo Yu, Xiangyu Li, Naiwen Zhang, and Yihe Sun, "A low cost, low power AES ASIC with high DPA resisting ability", Proceedings of Technical Papers - 2009 IEEE Asian Solid-State Circuits Conference, A-SSCC 2009, pp.285-288, 2009.

DOI: 10.1109/asscc.2009.5357254

Google Scholar

[3] Jasper G. J. van Woudenberg, Marc F. Witteman, Bram Bakker, "Improving Differential Power Analysis by Elastic Alignment", The Cryptographers' Track at the RSA Conference 2011, pp.104-119, 2011.

DOI: 10.1007/978-3-642-19074-2_8

Google Scholar

[4] Xavier Charvet, Herve Pelletier, "Improving the DPA attack using Wavelet transform", NIST Physical Security Testing Workshop, 2005.

Google Scholar

[5] E. Laciar, R Jane, D. H. Brooks, "A New Alignment Method Based on the Wavelet Multi-scale Cross-Correlation for Noisy High Resolution ECG Records", Engineering in Medicine and Biology Society, 2001.

DOI: 10.1109/iembs.2001.1017179

Google Scholar

[6] Naofumi Homma, et al., "High-Resolution Side-channel Attack Using Phase-Based Waveform Matching", CHES06, LNCS 4249, pp.187-200, (2006)

Google Scholar

[7] S. Mangard, E. Oswald and T. Popp, "Power Analysis Attacks-Revealing the secrets of Smart Cards", Springer, pp.168-222, 2007.

Google Scholar

[8] E. Brier, C. Clavier, F. Oliver, "Correlation Power Analysis with a Leakage Model", Cryptographic Hardware and Embedded Systems-CHES 2004.LNCS 3203, pp.16-29.

DOI: 10.1007/978-3-540-28632-5_2

Google Scholar